For each observed error, we create controls in the CA software to prevent 
the occurrence of these errors, in addition we are subordinate to a ROOT CA 
that is also pointed out about errors in our certificates. We work with CAB 
lint to monitor the issued certificates.

Em quinta-feira, 17 de novembro de 2022 às 14:21:37 UTC-3, 
[email protected] escreveu:

> On Thu, Nov 17, 2022 at 9:02 AM Lucia Castelli <[email protected]> 
> wrote:
>
>> Indeed, in the beginning we had many certificates issued erroneously and 
>> we started to monitor these certificates to eliminate such errors.
>> We believe that they are errors that any CA can have and that makes the 
>> process of revoking and replacing certificates, as with any other CA, that 
>> is already in the root program of Mozilla or any other root program.
>>
>
> Mistakes do happen, but there are simple technical mechanisms that an 
> issuer can implement to prevent this particular mistake.
>  
>
>> Daily we receive emails from bugzilla where we can see many certificates 
>> issued by major competitors CA with errors.
>> We believe that there is no CA that is ready and mature to not make 
>> mistakes when starting to operate in these issuing. 
>> We have been trying to submit to this program for more than 2 years and 
>> we are always attentive and making efforts to do our best within compliance.
>>
>
> What have you done to make sure this doesn't happen again?
>
> Do you have an incident remediation process? Can you share any remediation 
> & response artifacts (e.g., postmortems)?
>
> Mike
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"public" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/ccadb.org/d/msgid/public/dc6a28f4-0a68-4a94-bbec-266e3fd31d9dn%40ccadb.org.

Reply via email to